The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Within software coding standards, identifier naming plays an important role. Identifier naming conventions were divided into four categories in our research - Hungarian, Pascal, Camel and Underscore. Such techniques in compiler theory as regular expression and lexical analysis were used to extract identifiers and to match them with the defined naming conventions in our evaluation system. The consistency...
Outlier detection is a hot topic of data mining. After analyzing current detection technologies, a detection method of outlier based on clustering analysis is proposed, in which an effective sample is screened out from original data. According to agglomerative of hierarchical clustering, credible sample set is found. Then mathematical expectation and standard deviation are obtained by credible sample...
This paper proposes the mode and teaching methods of professional training teaching based on the SDP(Software Delivery Process). At last appraisal the result through the given Algorithm. It presents a reference for undergraduate teaching.
Outlier detection is a hot topic of data mining. After studying the existing classical algorithms of detecting outlier, this paper proposes an outlier mining algorithm based on confidence interval, and makes a new definition for outlier. The method combines mathematical statistics and density-based clustering algorithm. It clustering firstly with DBSCAN algorithm, obtains credible sample and suspicious...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.